CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
114 results Clear all
CVE-2024-40682 6.2 MEDIUM EPSS 0.00
IBM SmartCloud Analytics - Log Analysis <1.3.8.2 - DoS
IBM SmartCloud Analytics - Log Analysis 1.3.7.0, 1.3.7.1, 1.3.7.2, 1.3.8.0, 1.3.8.1, and 1.3.8.2 could allow a local user to cause a denial of service due to improper validation of specified type of input.
CWE-1287 Jul 23, 2025
CVE-2025-24335 2.0 LOW EPSS 0.00
Nokia Single RAN <24R1-SR 2.1 MP - DoS
Nokia Single RAN baseband software versions earlier than 24R1-SR 2.1 MP contain a SOAP message input validation flaw, which in theory could potentially be used for causing resource exhaustion in the Single RAN baseband OAM service. No practical exploit has been detected for this flaw. However, the issue has been corrected starting from release 24R1-SR 2.1 MP by adding sufficient input validation for received SOAP requests, effectively mitigating the reported issue.
CWE-1287 Jul 02, 2025
CVE-2025-40910 6.5 MEDIUM EPSS 0.00
Net::IP::LPM 1.10 - Info Disclosure
Net::IP::LPM version 1.10 for Perl does not properly consider leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses. Leading zeros are used to indicate octal numbers, which can confuse users who are intentionally using octal notation, as well as users who believe they are using decimal notation.
CWE-1287 Jun 27, 2025
CVE-2025-52883 5.3 MEDIUM EPSS 0.00
Meshtastic-Android <2.5.21 - Info Disclosure
Meshtastic-Android is an Android application for the mesh radio software Meshtastic. Prior to version 2.5.21, an attacker is able to send an unencrypted direct message to a victim impersonating any other node of the mesh. This message will be displayed in the same chat that the victim normally communicates with the other node and it will appear as using PKC, while it is not. This means that the victim will be provided with a false sense of security due to the green padlock displayed when using PKC and they'll read the attacker's message as legitimate. Version 2.5.21 contains a patch for the issue. It is suggested to implement a stricter control on whether a message has been received using PKC or using the shared Meshtastic channel key. Moreover, instead of showing no green padlock icon in the chat with no PKC, consider using an explicit indicator like, for example, the yellow half-open padlock displayed when in HAM mode. This remediation, however, applies to the client applications rather than the Meshtastic firmware.
CWE-1287 Jun 24, 2025
CVE-2025-25020 6.5 MEDIUM EPSS 0.00
IBM Cloud Pak For Security < 1.10.11.0 - Denial of Service
IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow an authenticated user to cause a denial of service due to improperly validating API data input.
CWE-1287 Jun 03, 2025
CVE-2025-0325 4.3 MEDIUM EPSS 0.00
Axis - DoS
A Guard Tour VAPIX API parameter allowed the use of arbitrary values and can be incorrectly called, allowing an attacker to block access to the guard tour configuration page in the web interface of the Axis device.
CWE-1287 Jun 02, 2025
CVE-2025-40911 6.5 MEDIUM EPSS 0.00
Net::CIDR::Set <0.14 - Info Disclosure
Net::CIDR::Set versions 0.10 through 0.13 for Perl does not properly handle leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses. Leading zeros are used to indicate octal numbers, which can confuse users who are intentionally using octal notation, as well as users who believe they are using decimal notation. Net::CIDR::Set used code from Net::CIDR::Lite, which had a similar vulnerability CVE-2021-47154.
CWE-1287 May 27, 2025
CVE-2025-41650 7.5 HIGH EPSS 0.00
cmd services - DoS
An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service.
CWE-1287 May 27, 2025
CVE-2025-20155 6.0 MEDIUM EPSS 0.00
Cisco IOS XE - Privilege Escalation
A vulnerability in the bootstrap loading of Cisco IOS XE Software could allow an authenticated, local attacker to write arbitrary files to an affected system. This vulnerability is due to insufficient input validation of the bootstrap file that is read by the system software when a device is first deployed in SD-WAN mode or when an administrator configures SD-Routing on the device. An attacker could exploit this vulnerability by modifying a bootstrap file generated by Cisco Catalyst SD-WAN Manager, loading it into the device flash, and then either reloading the device in a green field deployment in SD-WAN mode or configuring the device with SD-Routing. A successful exploit could allow the attacker to perform arbitrary file writes to the underlying operating system.
CWE-1287 May 07, 2025
CVE-2025-46342 8.5 HIGH 1 Writeup EPSS 0.00
Kyverno <1.13.5-1.14.0 - Privilege Escalation
Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.13.5 and 1.14.0, it may happen that policy rules using namespace selector(s) in their match statements are mistakenly not applied during admission review request processing due to a missing error propagation in function `GetNamespaceSelectorsFromNamespaceLister` in `pkg/utils/engine/labels.go`. As a consequence, security-critical mutations and validations are bypassed, potentially allowing attackers with K8s API access to perform malicious operations. This issue has been patched in versions 1.13.5 and 1.14.0.
CWE-1287 Apr 30, 2025
CVE-2025-41395 6.5 MEDIUM EPSS 0.00
Mattermost Server < 9.11.11 - Denial of Service
Mattermost versions 10.4.x <= 10.4.2, 10.5.x <= 10.5.0, 9.11.x <= 9.11.10 fail to properly validate the props used by the RetrospectivePost custom post type in the Playbooks plugin, which allows an attacker to create a specially crafted post with maliciously crafted props and cause a denial of service (DoS) of the web app for all users.
CWE-1287 Apr 24, 2025
CVE-2025-32442 7.5 HIGH 1 Writeup EPSS 0.00
Fastify <5.3.0 - Auth Bypass
Fastify is a fast and low overhead web framework, for Node.js. In versions 5.0.0 to 5.3.0 as well as version 4.29.0, applications that specify different validation strategies for different content types have a possibility to bypass validation by providing a _slightly altered_ content type such as with different casing or altered whitespacing before `;`. This was patched in v5.3.1, but the initial patch did not cover all problems. This has been fully patched in v5.3.2 and v4.29.1. A workaround involves not specifying individual content types in the schema.
CWE-1287 Apr 18, 2025
CVE-2024-42189 6.5 MEDIUM EPSS 0.00
Hcltech Bigfix Platform < 10.0.13 - Denial of Service
HCL BigFix Web Reports might be subject to a Denial of Service (DoS) attack, due to a potentially weak validation of an API parameter.
CWE-1287 Apr 15, 2025
CVE-2024-47261 4.3 MEDIUM EPSS 0.00
Axis < - Path Traversal
51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of the Axis device.
CWE-1287 Apr 08, 2025
CVE-2025-3070 6.5 MEDIUM EPSS 0.00
Google Chrome < 135.0.7049.52 - Privilege Escalation
Insufficient validation of untrusted input in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)
CWE-20 Apr 02, 2025
CVE-2025-1558 6.5 MEDIUM EPSS 0.00
Mattermost Mobile Apps <=2.25.0 - Info Disclosure
Mattermost Mobile Apps versions <=2.25.0 fail to properly validate GIF images prior to rendering which allows a malicious user to cause the Android application to crash via message containing a maliciously crafted GIF.
CWE-1287 Mar 24, 2025
CVE-2024-47262 5.3 MEDIUM EPSS 0.00
AXIS OS - RCE
Dzmitry Lukyanenka, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API param.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the web interface of the Axis device. Other API endpoints or services not making use of param.cgi are not affected. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
CWE-1287 Mar 04, 2025
CVE-2024-56908 6.8 MEDIUM EPSS 0.00
Perfex Crm <3.2.1 - Auth Bypass
In Perfex Crm < 3.2.1, an authenticated attacker can send a crafted HTTP POST request to the affected upload_sales_file endpoint. By providing malicious input in the rel_id parameter, combined with improper input validation, the attacker can bypass restrictions and upload arbitrary files to directories of their choice, potentially leading to remote code execution or server compromise.
CWE-444 Feb 13, 2025
CVE-2024-12756 7.3 HIGH EPSS 0.00
Avaya Spaces - Info Disclosure
An HTML Injection vulnerability in Avaya Spaces may have allowed disclosure of sensitive information or modification of the page content seen by the user.
CWE-1287 Feb 11, 2025
CVE-2025-24876 8.1 HIGH EPSS 0.00
SAP Approuter Node.js <v16.7.1 - Auth Bypass
The SAP Approuter Node.js package version v16.7.1 and before is vulnerable to Authentication bypass. When trading an authorization code an attacker can steal the session of the victim by injecting malicious payload causing High impact on confidentiality and integrity of the application
CWE-302 Feb 11, 2025